Security Architecture & Design

profilesirisneha

Previous project was to provide a security assessment for Vestige, Inc, an online software company that specialize in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that Vestige system be assessed and verified as secure.


Now that you have provided your security assessment, the next step is to provide Vestige, Inc. with your Security Portfolio. Using this week's Reading on the NIST framework that includes the 5-step process for creating a balanced portfolio of security products, your assignment will be to create a Security Portfolio with the following sections:

 

1. Cover Page (i.e. APA title page)

2. Background (provide a synopsis your midterm security assessment on Vestige)

3. For each security need identified (or needs to be identified) from your Week #8's Midterm Assignment, Find the products that will deliver the needed capabilities for the right price, and tell why you chose that product.


This assignment should be about the security needs only.  Do NOT discuss how the client can achieve more business (That is not your job). Please use  APA format and include at least two references.


Length: Minimum of 600 Words


Previous Assignment:

Vestige, Inc. is an online software company that specialize in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that Vestige system be assessed and verified as secure.

Your company has designated you to be the lead architect for this project because it’s a small company and perfect for your first time.  


Answer: Please refer the attached word doc.


    • 3 years ago
    • 16
    Answer(1)

    Purchase the answer to view it

    blurred-text
    • attachment
      SECURITYPORTFOLIO.edited.docx
    • attachment
      TurnitinReport-securityportfolio.pdf